:: Related Links
:: Change Language
:: Cool Sites

Play Flash Games Now


Posted by admin on Jul 23, 2014

Following an extensive security report from an iOS forensic and security expert that questioned some of Apple’s iOS tools when it comes to the user’s security and privacy (see his questions in the image above), Apple has taken another step to address “backdoor” concerns on top of stating that it’s not working with anyone to include backdoors in any of its products. Researcher Jonathan Zdziarski said in his paper that certain tools available in iOS will allow governmental spying agencies and other third parties to remotely control an iOS device and install silent malware that could then be used to spy on an unsuspecting user. Apple has published a new support document on its website, offering some explanations on how

Read More | Read 1 times | BGR News

Posted by admin on Jul 23, 2014

By Chijioke Ohuocha LAGOS (Reuters) - PayPal has signed up "tens of thousand" of Nigerians in its first week of operating in Africa's biggest economy, with consumers already purchasing items from Britain, China and the United States via its online platform, a company official said. E-commerce remains in its infancy in most of Africa but is growing exponentially with the advent of online retailers such as Jumia, partly owned by South African phone operator MTN, and a growing middle class with money to spend. ...

Read More | Read 1 times | Reuters

Posted by admin on Jul 23, 2014

NEW YORK (AP) — Cyber thieves got into more than 1,000 StubHub customers' accounts and fraudulently bought tickets for events through the online ticket reseller, a law enforcement official and the company said.

Read More | Read 1 times | Associated Press

Posted by admin on Jul 23, 2014

By Deepa Seetharaman and Jim Finkle SEATTLE/BOSTON (Reuters) - eBay Inc's StubHub online ticket resale service said it was the victim of a massive international cyber fraud ring, the details of which authorities plan to disclose on Wednesday as they announce arrests in the case. StubHub's head of global communications, Glenn Lehrman, told Reuters late on Tuesday that his firm has been working with law enforcement around the world for the last year on the case. Lehrman said he could not say how much money was involved or how many people were being charged ahead of announcements planned by authorities in several countries on Wednesday. Fraudulent charges were posted after hackers obtained user credentials by hacking into other sites, then used them to log in StubHub, he said.

Read More | Read 1 times | Reuters

Posted by admin on Jul 23, 2014

Kevin Curran is a reader in Computer Science at the University of Ulster and an IEEE Senior Member. The Internet of Things  (IoT) will allow consumers to interact with nearly every appliance and device they own. We are seeing elements of the IoT in the marketplace already, with home automation having a strong consumer pull — controlling the lights and temperature, closing the garage door while across town, getting alerts from a smoke detector. If IoT is campaigning to run nearly every aspect of people's digital lives, we need to consider factors that will ensure a seamless and safe introduction.

Read More | Read 1 times | LiveScience.com

Posted by admin on Jul 23, 2014

Xiaomi launched its flagship Mi 4 smartphone at a glitzy event in Beijing, where the Chinese budget handset maker's chief executive sought to challenge larger U.S. rival Apple Inc. The Mi 4 comes as budget handset makers in China are competing more aggressively on price and generous features, with even high-end manufacturers feeling the pressure. Dressed in a black T-shirt and blue jeans, Xiaomi CEO Lei Jun took aim repeatedly at iPhone maker Apple during the presentation on Tuesday, comparing the design and manufacturing process of his new 4G handset to the U.S. firm's more expensive offerings. "Even our white color is whiter!" Apple, which was due to announce second-quarter earnings later on Tuesday, was not immediately available to comment. The forthright Jun spent nearly an hour on stage describing the Mi 4 phone's construction - particularly its beveled metal rim whose similarity with Apple's phones drew murmurs of "iPhone" from the journalists at the event.

Read More | Read 1 times | Reuters

Posted by admin on Jul 23, 2014

An extensive research paper from a security specialist revealed earlier this week that governments and other third-parties with malicious intentions would be able to use certain tools in iOS to extract information from iPhones and other iOS devices, without the user’s consent or knowledge. Apple has already issued a response on the matter, denying the existence of backdoors in its products, and further emphasizing the security and privacy features of iOS. “We have designed iOS so that its diagnostic functions do not compromise user privacy and security, but still provides needed information to enterprise IT departments, developers and Apple for troubleshooting technical issues,” Apple wrote in an email statement that was published on Twitter by Financial Times journalist Tim Bradshaw.

Read More | Read 1 times | BGR News

Posted by admin on Jul 23, 2014

By David Randall and Edwin Chan NEW YORK/SAN FRANCISCO (Reuters) - Apple, once a can't-miss stock, is finding it tough to persuade portfolio managers to come back into the fold. Yet the company remains one of the most significantly underweighted stocks among large cap fund managers, according to a Goldman Sachs report. Part of the reason for a lack of portfolio manager enthusiasm is that Apple Inc no longer seems to be the hot growth company of old, fund managers say. Apple reports results for its fiscal third quarter on Tuesday, July 22.

Read More | Read 1 times | Reuters

Posted by admin on Jul 23, 2014

By David Randall and Edwin Chan NEW YORK/SAN FRANCISCO (Reuters) - Apple, once a can't-miss stock, is finding it tough to persuade portfolio managers to come back into the fold. Yet the company remains one of the most significantly underweighted stocks among large cap fund managers, according to a Goldman Sachs report. Part of the reason for a lack of portfolio manager enthusiasm is that Apple Inc no longer seems to be the hot growth company of old, fund managers say. Apple reports results for its fiscal third quarter on Tuesday, July 22.

Read More | Read 1 times | Reuters

Posted by admin on Jul 23, 2014

(Reuters) - A highly anticipated talk on how to identify users of the Tor service, widely used to access the Internet anonymously, has been withdrawn from next month's annual Black Hat security conference. Hacking experts disclose vulnerabilities at conferences to alert the public about security flaws, both to pressure developers to fix them and to warn users about products that may not be completely safe. Here are some examples of other hacking talks that have been pulled from conferences over the past decade: 2013 - Three European computer scientists canceled a talk on hacking the locks of luxury cars at a prestigious U.S. academic conference known as USENIX, after Volkswagen AG obtained a restraining order from a British court. 2007 - Security firm IOActive Inc pulled a talk at Black Hat DC on bugs in radio-frequency identification, or RFID, technology, saying it was pressured to do so by RFID technology firm HID Global Corp. 2005 - Cisco Systems Inc persuaded security firm Internet Security Systems to pull a discussion on hacking routers by researcher Michael Lynn at the Black Hat hacking conference in Las Vegas.

Read More | Read 1 times | Reuters

• Security researcher: iOS security has been intentionally compromised by Apple (Jul 23, 2014)

• Kenya military Twitter account hacked (Jul 23, 2014)

• Huawei's H1 revenue up 19 percent year-on-year at $22 billion (Jul 23, 2014)

• Snowden seeks to develop anti-surveillance technologies (Jul 23, 2014)

• Golf-Blood spilt as Els says he put 'jinx' on his group (Jul 23, 2014)

• Hackers target Nest as a warning to Google about data-sharing (Jul 23, 2014)

• Hackers target Nest in as a warning to Google about data-sharing (Jul 23, 2014)

• Blood spilt as Els says he put 'jinx' on his group (Jul 23, 2014)

• These are the absurd names British intelligence spies have to remember to spy on you (Jul 23, 2014)

• 'Smart' technology could make utilities more vulnerable to hackers (Jul 23, 2014)

• Apple, IBM team up in mobile devices, applications (Jul 23, 2014)

• Insurers struggle to get grip on burgeoning cyber risk market (Jul 23, 2014)

• FBI cyber expert is ex-discount furniture salesman (Jul 23, 2014)

• Chinese man accused of hacking into US computers (Jul 23, 2014)

• Microsoft says cybercrime bust frees 4.7 million infected PCs (Jul 23, 2014)

:: Search
:: Sponsored Links